Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-08-2022 17:46
Static task
static1
Behavioral task
behavioral1
Sample
GfsFepFIKsNGpt.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
GfsFepFIKsNGpt.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
request.lnk
Resource
win7-20220812-en
General
-
Target
request.lnk
-
Size
1KB
-
MD5
1d0f13665c86358fa7ac3c9f6ea11aab
-
SHA1
85755e92d2a690eb47e12ef98034c6e7aeef467c
-
SHA256
cdac9fcc6ae12f37231ab1be5515275f1c301f7e10a542059ad0fb82174b30b3
-
SHA512
8596dadb49514ecc94c6cfad0b8e0b8c59ba9d4e01d61c1b54390f83c4261ba8ed3d8fc92535916f0fd3ca950961c5b90a319eb688a1a34d0f4748b2a65782a7
Malware Config
Extracted
bumblebee
3108
54.203.130.81:428
103.160.22.125:439
100.194.5.156:279
138.10.128.167:465
16.68.199.17:119
49.58.238.45:318
158.121.21.147:265
76.179.109.138:320
219.114.206.84:318
242.123.229.45:306
247.142.48.124:278
137.128.84.3:389
178.18.89.43:472
68.72.230.54:206
253.1.172.156:320
88.12.127.219:297
113.50.222.178:284
135.21.140.60:404
64.44.102.36:443
247.232.101.39:263
25.164.199.235:483
229.34.16.142:331
161.192.84.102:421
92.50.58.134:268
150.69.136.89:264
117.250.45.148:196
193.19.186.178:227
80.161.122.170:210
51.83.249.204:443
244.56.215.21:367
146.70.106.163:443
22.226.202.236:160
5.98.161.45:407
169.173.118.1:482
241.97.45.244:361
25.22.207.178:454
33.152.14.249:176
225.69.64.137:234
66.123.133.120:125
233.57.245.52:193
175.88.206.214:229
12.171.4.209:360
203.176.214.111:334
22.233.59.206:201
81.135.6.89:355
151.147.0.228:393
129.92.194.112:238
249.69.235.102:423
131.243.196.86:251
135.47.154.49:225
225.22.137.126:322
18.153.76.23:229
189.3.235.110:232
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF odbcconf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo odbcconf.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ odbcconf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ odbcconf.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions odbcconf.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion odbcconf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate odbcconf.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Wine odbcconf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 596 odbcconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe 596 odbcconf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 596 1788 cmd.exe 28 PID 1788 wrote to memory of 596 1788 cmd.exe 28 PID 1788 wrote to memory of 596 1788 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\request.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\odbcconf.exe"C:\Windows\System32\odbcconf.exe" /a {REGSVR GfsFepFIKsNGpt.dll}2⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:596
-